{"id":"https://openalex.org/W1975944318","doi":"https://doi.org/10.1631/jzus.c1000425","title":"k-Dimensional hashing scheme for hard disk integrity verification in computer forensics","display_name":"k-Dimensional hashing scheme for hard disk integrity verification in computer forensics","publication_year":2011,"publication_date":"2011-10-01","ids":{"openalex":"https://openalex.org/W1975944318","doi":"https://doi.org/10.1631/jzus.c1000425","mag":"1975944318"},"language":"en","primary_location":{"id":"doi:10.1631/jzus.c1000425","is_oa":false,"landing_page_url":"https://doi.org/10.1631/jzus.c1000425","pdf_url":null,"source":{"id":"https://openalex.org/S199067057","display_name":"Journal of Zhejiang University SCIENCE C","issn_l":"1869-1951","issn":["1869-1951","1869-196X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311937","host_organization_name":"Zhejiang University Press","host_organization_lineage":["https://openalex.org/P4310311937"],"host_organization_lineage_names":["Zhejiang University Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Zhejiang University SCIENCE C","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008190964","display_name":"Zoe L. Jiang","orcid":"https://orcid.org/0000-0002-8944-7444"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Zoe Lin Jiang","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, 518055, China","The University of Hong Kong","Harbin Institute of Technology Shenzhen Graduate School"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, 518055, China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"Harbin Institute of Technology Shenzhen Graduate School","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013234988","display_name":"Junbin Fang","orcid":"https://orcid.org/0000-0002-0730-8732"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jun-bin Fang","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109853326","display_name":"Lucas C. K. Hui","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Lucas Chi Kwong Hui","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110500992","display_name":"Siu\u2010Ming Yiu","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"SiuMing Yiu","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040488307","display_name":"K. P. Chow","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kam Pui Chow","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004949249","display_name":"Sheng Meng-meng","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Meng-meng Sheng","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China","The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008190964"],"corresponding_institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213","https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12660501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"10","first_page":"809","last_page":"818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.9004356265068054},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7573095560073853},{"id":"https://openalex.org/keywords/dynamic-perfect-hashing","display_name":"Dynamic perfect hashing","score":0.5006892681121826},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4807417392730713},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.4674234092235565},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.43138813972473145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30308181047439575},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.2010212242603302},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1630379557609558},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.15648391842842102}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.9004356265068054},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7573095560073853},{"id":"https://openalex.org/C122907437","wikidata":"https://www.wikidata.org/wiki/Q5318999","display_name":"Dynamic perfect hashing","level":5,"score":0.5006892681121826},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4807417392730713},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.4674234092235565},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43138813972473145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30308181047439575},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.2010212242603302},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1630379557609558},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.15648391842842102},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1631/jzus.c1000425","is_oa":false,"landing_page_url":"https://doi.org/10.1631/jzus.c1000425","pdf_url":null,"source":{"id":"https://openalex.org/S199067057","display_name":"Journal of Zhejiang University SCIENCE C","issn_l":"1869-1951","issn":["1869-1951","1869-196X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311937","host_organization_name":"Zhejiang University Press","host_organization_lineage":["https://openalex.org/P4310311937"],"host_organization_lineage_names":["Zhejiang University Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Zhejiang University SCIENCE C","raw_type":"journal-article"},{"id":"pmh:oai:hub.hku.hk:10722/152476","is_oa":false,"landing_page_url":"http://hdl.handle.net/10722/152476","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1489745481","https://openalex.org/W1521685024","https://openalex.org/W1566345534","https://openalex.org/W1577411051","https://openalex.org/W1718556058","https://openalex.org/W1964600147","https://openalex.org/W1984981793","https://openalex.org/W2103407731","https://openalex.org/W2157491168","https://openalex.org/W2161234420","https://openalex.org/W2168154523","https://openalex.org/W2293436221","https://openalex.org/W2897712513","https://openalex.org/W4214733219","https://openalex.org/W6634424145"],"related_works":["https://openalex.org/W1551533237","https://openalex.org/W4251536634","https://openalex.org/W2805134925","https://openalex.org/W2088296667","https://openalex.org/W4385261619","https://openalex.org/W3158263601","https://openalex.org/W2059096784","https://openalex.org/W2185281229","https://openalex.org/W1835589799","https://openalex.org/W2991841680"],"abstract_inverted_index":{"Verifying":[0],"the":[1,15,23,26,34,58,69,114,117,129,131,135,148,163,173,192,196,200,203],"integrity":[2,59,111,115,136],"of":[3,47,60,68,116,137,165,175,185],"a":[4,42,51,72,85,96,186],"hard":[5,27,149],"disk":[6,28],"is":[7,39,77],"an":[8,176],"important":[9],"concern":[10],"in":[11,50,107,147],"computer":[12],"forensics,":[13],"as":[14,110],"law":[16],"enforcement":[17],"party":[18],"needs":[19],"to":[20,40,92,100,133,154,179],"confirm":[21],"that":[22,162,190],"data":[24],"inside":[25],"have":[29],"not":[30],"been":[31],"modified":[32,78],"during":[33],"investigation.":[35],"A":[36],"typical":[37],"approach":[38],"compute":[41],"single":[43],"chained":[44],"hash":[45,103,125,166,197,204],"value":[46,126],"all":[48,61],"sectors":[49,63,70,94,106,118,139,146],"specific":[52],"order.":[53],"However,":[54],"this":[55,81,157],"technique":[56],"loses":[57],"other":[62],"even":[64,143],"if":[65],"only":[66],"one":[67],"becomes":[71],"bad":[73],"sector":[74,178],"occasionally":[75],"or":[76],"intentionally.":[79],"In":[80],"paper":[82],"we":[83],"propose":[84],"k-dimensional":[86],"hashing":[87,159],"scheme,":[88],"kD":[89,97,158],"for":[90,105,194,202],"short,":[91],"distribute":[93],"into":[95],"space,":[98],"and":[99,199],"calculate":[101],"multiple":[102],"values":[104,167,198,205],"k":[108],"dimensions":[109],"evidence.":[112],"Since":[113],"can":[119,140,168],"be":[120,141,169,180],"verified":[121,181],"depending":[122],"on":[123],"any":[124],"calculated":[127],"using":[128],"sectors,":[130],"probability":[132],"verify":[134],"unchanged":[138],"high":[142],"with":[144],"bad/modified":[145],"disk.":[150],"We":[151],"show":[152,189],"how":[153],"efficiently":[155],"implement":[156],"scheme":[160,188],"such":[161],"storage":[164,201],"reduced":[170],"while":[171],"increasing":[172],"chance":[174],"unaffected":[177],"successfully.":[182],"Experimental":[183],"results":[184],"3D":[187],"both":[191],"time":[193],"computing":[195],"are":[206],"reasonable.":[207]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
